kmcallister / aesni-examples
Example code for the AES crypto instructions on Intel chips
☆81Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for aesni-examples
- The code to the SGX-ROP paper☆183Updated 4 years ago
- Notes on various topics I'm interested in☆157Updated 9 years ago
- Securing storage encryption by using Intel SGX enclaves. First attempt for the isolation of OS components with trusted enclaves.☆81Updated 7 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆85Updated 3 years ago
- Docs and resources on CPU Speculative Execution bugs☆372Updated 6 years ago
- A bare-metal x86 instruction set fuzzer a la Sandsifter☆63Updated 8 months ago
- ☆70Updated 4 years ago
- This repository contains examples of DRAMA reverse-engineering and side-channel attacks☆172Updated 7 years ago
- A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber☆153Updated 7 years ago
- estimate peak virtual memory use☆19Updated 9 months ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆106Updated 2 years ago
- CRYPTOGAMS distribution repository☆56Updated 2 weeks ago
- A bitsliced implementation of ECB and CTR AES☆46Updated 3 months ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆214Updated 2 years ago
- ☆34Updated 6 years ago
- The Bear Operating System☆24Updated 7 years ago
- ☆179Updated 3 years ago
- Spectre attack against SGX enclave☆230Updated 6 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 7 years ago
- ☆171Updated 2 years ago
- SGX command-line tools and paper☆147Updated 8 years ago
- OpenSGX☆295Updated 4 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆165Updated 8 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆78Updated 5 years ago
- A Turing complete ROP compiler☆317Updated 11 years ago
- ☆145Updated 6 years ago
- Diablo is a retargetable link-time binary rewriting framework☆74Updated 3 years ago
- ☆35Updated 7 years ago
- ☆110Updated 10 years ago
- Experimental setup of "Intel MPX explained"☆26Updated 4 years ago